-
1
-
-
0036013593
-
Statistical mechanics of complex net-works
-
R. Albert and A. Barabasi, "Statistical mechanics of complex net-works," Rev. Modern Phys., vol. 74, pp. 47-97, 2002.
-
(2002)
Rev. Modern Phys.
, vol.74
, pp. 47-97
-
-
Albert, R.1
Barabasi, A.2
-
2
-
-
0034721164
-
Error and attack tolerance of complex networks
-
R. Albert, H. Jeong, and A. Barabasi, "Error and attack tolerance of complex networks," Nature, vol. 406, pp. 378-482, 2000.
-
(2000)
Nature
, vol.406
, pp. 378-482
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.3
-
3
-
-
84949221689
-
Spectral techniques in graph algorithms
-
N. Alon, "Spectral techniques in graph algorithms," in Proc. LATIN'98, 1998, pp. 206-215. (Pubitemid 128056278)
-
(1998)
Lecture Notes in Computer Science
, Issue.1380
, pp. 206-215
-
-
Alon, N.1
-
4
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Designing Privacy Enhancing Technologies
-
I. Clarke, O. Sandberg, B. Wiley, and T. Hong, "Freenet: A distributed anonymous information storage and retrieval system," Lecture Notes in Computer Science, vol. 2009, pp. 46-66, 2001. (Pubitemid 33241787)
-
(2001)
Lecture Notes in Computer Science
, Issue.2009
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
6
-
-
85076769385
-
Persistent personal names for globally connected mobile devices
-
B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris, "Persistent personal names for globally connected mobile devices," in Proc. 7th Symp. Operating Systems Design and Implementation (OSDI'06), 2006, pp. 233-248.
-
(2006)
Proc. 7th Symp. Operating Systems Design and Implementation (OSDI'06)
, pp. 233-248
-
-
Ford, B.1
Strauss, J.2
Lesniewski-Laas, C.3
Rhea, S.4
Kaashoek, F.5
Morris, R.6
-
7
-
-
0000318410
-
Robust threshold DSS signatures
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Robust threshold dss signatures," in Proc. EUROCRYPT'96, 1996, pp. 354-371 (Pubitemid 126071079)
-
(1996)
Lecture Notes in Computer Science
, Issue.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAMJ. Computing, vol. 17, no. 2, pp. 281-308, Apr. 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
10
-
-
0030646698
-
Proactive public key and signature schemes
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive public key and signature schemes," in Proc. ACM Conf. Computerand Communications Security, 1997,pp. 100-110.
-
(1997)
Proc. ACM Conf. Computerand Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
12
-
-
85077532807
-
A cooperative internet backup scheme
-
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, "A cooperative internet backup scheme," in Proc. USENIX Annual Technical Conf. (ATC'03), 2003, pp. 29-41.
-
(2003)
Proc. USENIX Annual Technical Conf. (ATC'03)
, pp. 29-41
-
-
Lillibridge, M.1
Elnikety, S.2
Birrell, A.3
Burrows, M.4
Isard, M.5
-
14
-
-
84880864572
-
Two-party generation of dsasignatures
-
Springer-Verlag
-
P. Mac Kenzieand M. Reiter,"Two-party generation of dsasignatures," inProc CRYPTO2001, 2001, pp. 137-154, Springer-Verlag.
-
(2001)
Proc CRYPTO2001
, pp. 137-154
-
-
Mac Kenzieand, P.1
Reiter, M.2
-
15
-
-
22144482558
-
Threshold MACs
-
Information Security and Cryptology - ICISC 2002
-
K. Martin, J. Pieprzyk, R. Safavi-Naini, H. Wang, and P. Wild, "Threshold macs," in Proc. 5th Int. Conf. Information Security and Cryptology (ICISC'02), 2002, pp. 237-252, Springer. (Pubitemid 36316803)
-
(2002)
Lecture Notes in Computer Science
, Issue.2587
, pp. 237-252
-
-
Martin, K.M.1
Pieprzyk, J.2
Safavi-Naini, R.3
Wang, H.4
Wild, P.R.5
-
16
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and analysis of online social networks," in Proc. Internet Meas. Comf., 2007, pp. 29-42.
-
(2007)
Proc. Internet Meas. Comf.
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, P.3
Druschel, P.4
Bhattacharjee, B.5
-
17
-
-
80054703857
-
Ostra: Leveraging trust to thwart unwanted communication
-
A. Mislove, A. Post, P. Druschel, and K. Gummadi, "Ostra: Leveraging trust to thwart unwanted communication," in Proc. 5th USENIXSymp. Networked Systems Design and Implementation (NSDI'08), 2008, pp. 15-30.
-
(2008)
Proc. 5th USENIXSymp. Networked Systems Design and Implementation (NSDI'08)
, pp. 15-30
-
-
Mislove, A.1
Post, A.2
Druschel, P.3
Gummadi, K.4
-
18
-
-
0003508562
-
-
National Instituteof Standards and Technology (NIST) May 19
-
Digital Signature Standard, FIPS Publication 186, National Institute of Standards and Technology (NIST), May 19, 1994.
-
(1994)
Digital Signature Standard, FIPS Publication 186
-
-
-
19
-
-
26444603424
-
Proactive twoparty signatures for user authentication
-
A. Nicolosi, M. Krohn, Y. Dodis, and D. Mazières, "Proactive twoparty signatures for user authentication," in Proc. Network and Distributed System Security (NDSS'03), San Diego, CA, 2003.
-
(2003)
Proc. Network and Distributed System Security (NDSS'03), San Diego, CA
-
-
Nicolosi, A.1
Krohn, M.2
Dodis, Y.3
Mazières, D.4
-
20
-
-
33645418463
-
Safe and private data sharing with turtle: Friends team-up and beat the system
-
B. Popescu, B. Crispo, and A. Tanenbaum, "Safe and private data sharing with turtle: Friends team-up and beat the system," in Proc. Security Protocols Workshop, 2004, pp. 213-220.
-
(2004)
Proc. Security Protocols Workshop
, pp. 213-220
-
-
Popescu, B.1
Crispo, B.2
Tanenbaum, A.3
-
21
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
Advances in Cryptology - CRYPTO '98
-
T. Rabin, "A simplified approach to threshold and proactive RSA," in Proc. CRYPTO'98, 1998, pp. 89-104, Springer. (Pubitemid 128118999)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 89-104
-
-
Rabin, T.1
-
22
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
24
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr, "Efficient signature generation by smart cards," J. Cryptology, vol. 4, pp. 161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
25
-
-
0018545449
-
How to share a secret
-
Nov.
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
34547453122
-
Understanding churn in peer-to-peer networks
-
DOI 10.1145/1177080.1177105, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
D. Stutzbach and R. Rejaie, "Understanding churn in peer-to-peer networks," in Proc. 6th ACM SIGCOMM Conf. Internet Measurement (IMC'06), 2006, pp. 189-202. (Pubitemid 47165601)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 189-202
-
-
Stutzbach, D.1
Rejaie, R.2
-
27
-
-
79951837200
-
-
[Online] Available
-
TCG [Online]. Available: https://www.trustedcomputinggroup.org/
-
-
-
-
28
-
-
77952350757
-
Exploiting social networks for threshold signing: Attack-resilience vs. availability
-
S. Xu, X. Li, and P. Parker, "Exploiting social networks for threshold signing: Attack-resilience vs. availability," in Proc. ACMSymp. Information, Computerand Communications Security(ASIACCS'08),2008, pp. 325-336.
-
(2008)
Proc. ACMSymp. Information, Computerand Communications Security(ASIACCS'08)
, pp. 325-336
-
-
Xu, S.1
Li, X.2
Parker, P.3
-
29
-
-
26844502785
-
Two efficient and provably secure schemes for server-assisted threshold signatures
-
S. Xu and R. Sandhu, "Two efficient and provably secure schemes for server-assisted threshold signatures," in Proc. Topics in Cryptology (CT-RSA 2003), 2003, pp. 355-372.
-
(2003)
Proc. Topics in Cryptology (CT-RSA 2003)
, pp. 355-372
-
-
Xu, S.1
Sandhu, R.2
-
31
-
-
0004196480
-
-
Ph.D. thesis Carnegie Mellon Univ., Pittsburgh, PA
-
B. Yee, "Using Secure Coprocessors," Ph.D. thesis, Carnegie Mellon Univ., Pittsburgh, PA, 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.1
-
32
-
-
45749116664
-
Sybillimit: A nearoptimal social network defense against sybil attacks
-
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: A nearoptimal social network defense against sybil attacks," in Proc. IEEE Symp. Security and Privacy, 2008, pp. 3-17.
-
(2008)
Proc. IEEE Symp. Security and Privacy
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
33
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
DOI 10.1145/1151659.1159945
-
H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "Sybilguard: Defending against sybil attacks via social networks," in Proc. ACMSIGCOMM 2006, 2006, pp. 267-278. (Pubitemid 44623733)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|